In order to force an attachability check, a SQL database must be present on a protected volume. If Rapid Recovery does not detect the presence of a database, the attachability check function does not appear in the Core Console.
Complete the steps in this procedure to force the system to perform an attachability check for a specific SQL server recovery point.
- In the left navigation area of the Rapid Recovery Core Console, select the protected SQL Server machine for which you want to force the attachability check, and then click the Recovery Points menu.
- Scroll down to the Recovery Points pane.
- Navigate through the recovery points to find the desired recovery point. Optionally, click the arrow to the right of a recovery point in the list to expand the view.
In the expanded recovery point information, you can see volumes included in the recovery point.
- In the Recovery Points pane, from the row representing the correct recovery point, click , and from the drop-down menu, select Force Attachability Check.
- In the resulting dialog box, click to confirm that you want to force an attachability check.
The dialog box closes. The system performs the attachability check.
For instructions on how to view the status of the attachability check, see Viewing events using tasks, alerts, and journal pages.
Managing protected machines
This section describes how to view, configure and manage the protected machines in your Rapid Recovery environment.
You can manage protected machines from the Rapid Recovery Core Console, including the following tasks:
- You can view protected machines in the Rapid Recovery Core Console using options described in the topic Viewing protected machines.
- You can configure settings for a particular machine, which supersede Core default settings. Some configuration tasks include changing hypervisor host or VM settings, accessing system information, modifying transfer settings, customizing nightly jobs, or configuring notifications for events. For more information, see Configuring machine settings.
- You can remove a machine or cluster from protection, view license information for a protected machine, or diagnose problems by viewing the log file for a protected machine. For more information on these and other tasks, see Managing machines.
- You can view and manage data saved in the Core. For more information, see Managing snapshots and recovery points.
From the Home page on the Rapid Recovery Core Console, when viewing the Summary Tables view, you can see summary information for any machines protected by the Core in the Protected Machines pane.
NOTE: A software agent acts on behalf of the user to take specific actions. Protected machines are sometimes referred to as agents, since they run the Rapid Recovery Agent software to facilitate data backup and replication on the Rapid Recovery Core.
You can view the status, the display name for each machine, which repository it uses, the date and time of the last snapshot, how many recovery points exist in the repository for the machine, and the total amount of storage space the snapshots use in the repository.
To manage aspects of any protected machine, start by navigating to the machine you want to view, configure, or manage. From the Home page, there are three ways to navigate to a protected machine:
- You can click on the IP address or display name of any protected machine from the Protected Machines pane. This takes you to the Summary page for the selected protected machine.
- In the left navigation area, you can click on the title of the Protected Machines menu. The Protected Machines page appears. On this page, you can see summary information about each machine. For a detailed description of this page, see Viewing summary information for a protected machine.
- In the left navigation area, under the Protected Machines menu, you can click any protected machine IP address or display name. This takes you to the Summary page for the selected protected machine. For a detailed description of this page, see Viewing summary information for a protected machine.